US6253204B1 - Restoring broken links utilizing a spider process - Google Patents

Restoring broken links utilizing a spider process Download PDF

Info

Publication number
US6253204B1
US6253204B1 US08/992,407 US99240797A US6253204B1 US 6253204 B1 US6253204 B1 US 6253204B1 US 99240797 A US99240797 A US 99240797A US 6253204 B1 US6253204 B1 US 6253204B1
Authority
US
United States
Prior art keywords
link
information
document
computer
broken
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US08/992,407
Inventor
Bob Glass
Jakob Nielsen
BJ Fogg
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oracle America Inc
Original Assignee
Sun Microsystems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sun Microsystems Inc filed Critical Sun Microsystems Inc
Priority to US08/992,407 priority Critical patent/US6253204B1/en
Assigned to SUN MICROSYSTEMS, INC. reassignment SUN MICROSYSTEMS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GLASS, BOB, FOGG, BJ, NIELSEN, JAKOB
Application granted granted Critical
Publication of US6253204B1 publication Critical patent/US6253204B1/en
Assigned to Oracle America, Inc. reassignment Oracle America, Inc. MERGER AND CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: Oracle America, Inc., ORACLE USA, INC., SUN MICROSYSTEMS, INC.
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9566URL specific, e.g. using aliases, detecting broken or misspelled links
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99937Sorting
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99943Generating database or data structure, e.g. via user interface
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99944Object-oriented database structure
    • Y10S707/99945Object-oriented database structure processing

Definitions

  • the invention is directed to information systems and, more particularly, to the indication of broken and healed hypertext links in a network, such as the World Wide Web.
  • Navigating information systems such as the World Wide Web by using links can be a frustrating experience because many of these weblinks are “broken”, that is, they do not connect the user to the intended destination page. Instead, users receive an error message, such as “file not found.” Such errors create a suboptimal user experience when using these information systems.
  • the problems of the prior art are overcome by providing methods, apparatus, systems and computer program products for monitoring “file not found” error messages.
  • a user receives such an error message, it captures the URL and link information for the broken link and it generates a message to the website maintaining the document, that the link is not working.
  • the display of such a broken link is modified at least at the client side of a client server interaction.
  • the code for the web page that has the broken link is retrieved and modified so that the broken link has a new visual appearance.
  • this is modified by changing the mark-up language utilized for the page, such as HTML.
  • the new visual appearance could take various forms.
  • FIG. 1A is a view of exemplary computer system suitable for use in carrying out the invention.
  • FIG. 1B is a block diagram of an exemplary hardware configuration of the computer of FIG. 1 .
  • FIG. 1C is an illustration of an exemplary memory medium suitable for storing program and data information in accordance with the invention.
  • FIG. 1D is a block diagram of a network architecture suitable for carrying data and programs in accordance with some aspects of the invention.
  • FIG. 2 is a flow chart of an exemplary process used for handling broken information links in accordance with one embodiment of the invention.
  • FIG. 3 is a flow chart of an exemplary process for reporting a broken link.
  • FIG. 4 is an illustration of an exemplary message format for use in reporting broken and healed links in accordance with one embodiment of the invention.
  • FIG. 5 is a flow chart of an exemplary process for modifying the presentation or display attributes of a broken link at a server in accordance with one aspect of the invention.
  • FIG. 6 is a diagram of an exemplary database layout for a client process in accordance with one aspect of the invention.
  • FIG. 7 is a flow chart of an exemplary process for removing a broken link indication at a client when the link is healed.
  • FIG. 8 is a flow chart of an exemplary process for removing a broken link indication at a server when the link is healed.
  • FIG. 9 is a flow chart of an exemplary process for changing a presentation attribute of a link of a retrieved document.
  • FIG. 10 is a flow chart of an exemplary process for determining whether a link is broken.
  • FIG. 11 is a flow chart of an exemplary process for determining if a link is healed at a client in accordance with one embodiment of the invention.
  • FIGS. 12A and 12B represent an exemplary database layout for recording broken links and for gathering information on how well maintained a server site is.
  • FIG. 13 is a flow chart of an exemplary alternative process for handling broken links in accordance with one embodiment of the invention.
  • FIG. 14 is a flow chart of an exemplary spider process for periodically testing broken links.
  • FIG. 15 is an illustration of a preferred way to display a healed link using sparkle.
  • FIG. 16 is a flow chart of an exemplary process for cleaning up a database of broken links.
  • FIG. 17 is a flow chart of an exemplary process for running a centralized link reporting service in accordance with one aspect of the invention.
  • FIG. 18 is a flow chart of an exemplary process at a client for using a centralized link reporting service.
  • FIG. 19 is a flow chart of an alternative process for changing a display attribute for a link based on a probability that a connection to that link would succeed.
  • FIGS. 20A, 20 B and 20 C are exemplary flow charts of different processes for automatically removing document not found error messages.
  • a procedure is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. These steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It proves convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like. It should be noted, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities.
  • the manipulations performed are often referred to in terms, such as adding or comparing, which are commonly associated with mental operations performed by a human operator. No such capability of a human operator is necessary, or desirable in most cases, in any of the operations described herein which form part of the present invention; the operations are machine operations.
  • Useful machines for performing the operation of the present invention include general purpose digital computers or similar devices.
  • the present invention also relates to apparatus for performing these operations.
  • This apparatus may be specially constructed for the required purpose or it may comprise a general purpose computer as selectively activated or reconfigured by a computer program stored in the computer.
  • the procedures presented herein are not inherently related to a particular computer or other apparatus.
  • Various general purpose machines may be used with programs written in accordance with the teachings herein, or it may prove more convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these machines will appear from the description given.
  • FIG. 1A illustrates a computer of a type suitable for carrying out the invention.
  • a computer system has a central processing unit 100 having disk drives 110 A and 110 B.
  • Disk drive indications 110 A and 110 B are merely symbolic of a number of disk drives which might be accommodated by the computer system. Typically, these would include a floppy disk drive such as 110 A, a hard disk drive (not shown externally) and a CD ROM drive indicated by slot 110 B.
  • the number and type of drives varies, typically, with different computer configurations.
  • the computer has the display 120 upon which information is displayed.
  • a keyboard 130 and a mouse 140 are typically also available as input devices.
  • the computer illustrated in FIG. 1A is a SPARCTM workstation from Sun Microsystems, Inc.
  • FIG. 1B illustrates a block diagram of the internal hardware of the computer of FIG. 1A.
  • a bus 150 serves as the main information highway interconnecting the other components of the computer.
  • CPU 155 is the central processing unit of the system, performing calculations and logic operations required to execute programs.
  • Read only memory ( 160 ) and random access memory ( 165 ) constitute the main memory of the computer.
  • Disk controller 170 interfaces one or more disk drives to the system bus 150 . These disk drives may be floppy disk drives, such as 173 , internal or external hard drives, such as 172 , or CD ROM or DVD (Digital Video Disks) drives such as 171 .
  • a display interface 125 interfaces a display 120 and permits information from the bus to be viewed on the display.
  • An eyetracker 176 and a voice synthesizer 177 are used in clearing error messages. Communications with external devices can occur over communications port 185 .
  • FIG. 1C illustrates an exemplary memory medium which can be used with drives such as 173 in FIG. 1B or 110 A in FIG. 1 A.
  • memory media such as a floppy disk, or a CD ROM, or a Digital Video Disk will contain the program information for controlling the computer to enable the computer to perform its functions in accordance with the invention.
  • FIG. 1D is a block diagram of a network architecture suitable for carrying data and programs in accordance with some aspects of the invention.
  • a network 180 serves to connect a user computer 100 with either a server 185 or, alternatively, with server 190 for the download of program and data information.
  • FIG. 2 is a flow chart of an exemplary process used for handling broken information links in accordance with one embodiment of the invention.
  • a user such as user 100 or 100 ′ of FIG. 1D connects to server 1 ( 185 ) and requests download of a document, such as document 1 ( 200 ).
  • document 1 contains a hypertext link to document 2 located on server 2 ( 210 ). This could be, for example, server 2 as shown at 190 in FIG. 1 D.
  • server 2 as shown at 190 in FIG. 1 D.
  • the user double clicks on an information link, such as a hypertext link, and a client process attempts to connect to server 2 where the desired document 2 is supposed to be located ( 220 ).
  • document 2 is available ( 230 -Y)
  • document 2 is retrieved and displayed ( 240 ).
  • the information link is considered broken, at least for the moment, and the broken link handling described more hereinafter is pursued ( 260 ).
  • a document sometimes called file or page
  • a communications link linking the requesting user to a server may be down.
  • the server itself may be down for maintenance or because of malfunction.
  • document 2 has been removed from the server or the address for document 2 on that server has been changed.
  • document 2 has been moved to another server.
  • the information link pointing to document 2 may contain a typographical error (in the HTML of document 1 ) which does not accurately point to document 2 .
  • FIG. 3 is a flow chart of an exemplary process for reporting a broken link.
  • a document not found error message is generated, typically, in one of two ways. Either, a message is returned from the server containing the document requested indicating that it did not find the requested document or, alternatively, there may be no response at all in which case the local client process will detect a failure to respond and display a document not found error message.
  • the currently requested document information is placed in a message format, such as that shown in FIG. 4, in the broken link field ( 310 ).
  • the currently requested document information is typically information formatted in a uniform resource locator (URL) format such as utilized on the World Wide Web.
  • URL uniform resource locator
  • the URL information contains information identifying the server as well as the document located on the server to be retrieved.
  • An information link in a document retrieved from a server typically contains the URL of the document pointed to so that the user may connect to the server on which that document resides and retrieve the document.
  • it is customary to maintain a list of recently visited information links (i.e. their URL's).
  • the network address of the user (or client) which receives the file not found error message is placed in the source address field of the message format of FIG. 4 ( 330 ).
  • a broken link message is sent to the site which originated the page containing the broken link ( 340 ).
  • broken link information is concurrently stored in a broken link database such as that shown in FIG. 6 .
  • FIG. 4 is an illustration of an exemplary message format for use in reporting broken and healed links in accordance with one aspect of the invention.
  • the message is formatted as a packet 400 including a header 410 and a broken link identifier 420 .
  • the header portion of the message format includes, preferably, at least three components.
  • the source address, or the address of the user or process reporting the broken link is placed in the source address portion of the header.
  • the destination address is the address of the server from which the document containing the broken link was retrieved.
  • the broken link identifier 420 contains the URL of the document, the retrieval of which failed.
  • FIG. 5 is a flow chart of an exemplary process for modifying display of a broken link at a server in accordance with one aspect of the invention.
  • a server receives a broken link message from the user as discussed in conjunction with item 340 of FIG. 3, ( 500 )
  • the server retrieves the document identified as containing a broken link and modifies a presentation attribute of the broken link and stores a modified document ( 510 ).
  • the destination address for the message is the server in which the document is located which contains a broken link.
  • that document is retrieved, it is scanned to identify text which corresponds to the broken link identified in field 420 of the message.
  • the information link is identified, its attributes are modified by modifying the HTML code associated with the information link to change the presentation.
  • the color can change from its normal presentation (commonly blue) to a color indicating a broken link, such as red or yellow.
  • the presentation of the link which has been reported broken can be changed by placing an icon before, after or both before and after the information link to identify the fact that the link has been determined to be broken.
  • FIG. 6 is a diagram of an exemplary database layout for a client process in accordance with one aspect of the invention.
  • Database layout 600 is an exemplary form of storing that information.
  • the information contains a field 610 listing broken links and a field 620 showing the date and time at which the broken status of the link was identified.
  • the use of this database in conjunction with the client process permits a local user to have the functionality of broken link identification whether or not servers are equipped to modify the presentation of a document containing a broken link.
  • the data field 620 as shown in FIG. 6 can be utilized for implementing various clean-up policies for removing stale entries from the database, should that be desired.
  • FIG. 7 is a flow chart of an exemplary process for removing a broken link indication at a client when the link is healed.
  • a page has been retrieved which contains a broken link ( 710 ) as indicated by, for example, its presence in the local database shown in FIG. 6 or by virtue of presentation from a server equipped to identify broken links
  • the link will be removed from the local database of broken links ( 730 ) shown in FIG. 6 and a message will be formulated and sent to the site which originated the document containing the broken link that the link has been repaired ( 740 ) using the message format of FIG. 4 .
  • the server is not equipped to mark links which have been broken and healed, the message will simply be ignored.
  • the broken indication will be removed from the local database so that the information link which was previously listed and displayed broken, will now be displayed as normal.
  • FIG. 8 is a flow chart of an exemplary process for removing a broken link indication at a server when the link is healed.
  • a server receives the link restored message ( 810 ), using, for example, the message format of FIG. 4, the site retrieves the document identified as containing a broken link and modifies the presentation attribute of the broken link and stores a modified (restored) document ( 820 ).
  • a link When a link is healed, it is preferable to display the link in a modified form which distinguishes it from links which have never been broken and from broken links.
  • One form of displaying a healed link is discussed in conjunction with FIG. 15, hereinafter.
  • FIG. 9 is a flow chart of an exemplary process for changing a presentation attribute of links in a retrieved document on the client's side.
  • a check of the downloaded mark-up language such as HTML, is made to determine whether there are any information links in the document retrieved which have broken or healed display attributes. If there are ( 920 -Y), the local database is updated to contain information about those links ( 930 ). If there are no such information links having broken or healed display attributes ( 920 -N), a check is made to see if any of the information links in the document are contained in the local database ( 940 ). If they are, they are displayed with a presentation attribute appropriate to the broken/healed status specified in the database ( 950 ). In this way, broken and healed link information received from the server can be combined with that determined locally in the local database so that the link status information presented to a user reflects the latest information.
  • the downloaded mark-up language such as HTML
  • FIG. 10 is a flow chart of an exemplary process for determining whether a link is broken.
  • a timer is set ( 1020 ) and a check is made to determine whether or not the document is being received ( 1030 ). If it is, the document is indicated as available ( 1030 -Y). If it is not, ( 1030 -N), a check is made to see if the timer has expired ( 1040 ). If it has not, ( 1040 -N), after a certain period of time ( 1045 ), a check is repeated to see if a document is being received. If the timer has expired, ( 1040 -Y), the document is considered not available ( 1030 -N).
  • FIG. 11 is a flow chart of an exemplary process for determining if a link is healed at a server in accordance with one embodiment of the invention.
  • a user such as a Webmaster or maintenance person of a site clicks on a link marked as broken in the database ( 1110 )
  • the database maintained will be changed to show that the link is healed ( 1130 ).
  • FIG. 7 This is a simplified version of the process shown in FIG. 7 which is preferred for use at a server.
  • FIGS. 12A and 12B represent an exemplary database layout for recording broken links and for gathering information on how well maintained a server site is.
  • the server can preferably maintain certain information about the broken link. This information is shown in FIGS. 12A and 12B.
  • Field 1210 will store the identifier of the document located on the server containing the broken link.
  • the broken link itself will be identified in field 1220 .
  • Field 1230 contains an indication of the number of attempts made to connect to the particular link identified as broken. These can either be attempts initiated by the server or the number of reports received from users in the message format, or both.
  • Field 1220 is an indication of the number of attempts that were successful. This field is used mainly in conjunction with certain embodiments described hereinafter.
  • the date and time of the first attempt ( 1250 ) and the date and time of the last attempt ( 1260 ) made to connect to the broken link are recorded.
  • Field 1270 contains a list of each user reporting that that particular link is broken.
  • field 1230 of database 1200 One use for field 1230 of database 1200 is to identify for a particular broken link, how many attempts have been made to connect to the site. If only one attempt by one user has failed, it may be desirable to indicate the relative uncertainty of the information with a particular presentation attribute for the link stored in a document at the site, such as attribute 1 . If there were two attempts separated by more than an hour, there may be greater confidence that the link is broken and this may be indicated by a different attribute, such as attribute 2 . If there were two or more attempts separated by twenty-four hours, it may be desirable to display the broken link with a different attribute, such as attribute 3 . The time elapsed between a first and last report may be indicated by fields 1250 and 1260 . Thus, different attributes may specify the degree of severity of outage of a broken link.
  • FIG. 13 is a flow chart of an exemplary alternative process for handling broken links in accordance with an embodiment of the invention.
  • a message is received from a user that a link maintained on the server is broken ( 1310 )
  • this report is entered in the database ( 1320 ), such as the database shown in FIG. 12 .
  • the display attribute will be modified to show the broken link ( 1340 ).
  • This broken link report can then be scheduled for inclusion in a report to the web master of the site containing the document having a broken link ( 1350 ).
  • the report will trigger scheduling of a spider to check periodically for whether the document identified by the broken link report can be accessed and the result of that attempted access stored in the database ( 1360 ). If there is only one independent report of a broken link ( 1330 -N), no action will be taken unless independent confirmation is received.
  • FIG. 14 is a flow chart of an exemplary spider process for periodically testing broken links.
  • the process retrieves a list of broken links from the database ( 1410 ), preferably the database shown in FIGS. 12A and 12B. For each link, the spider attempts a connection ( 1420 ). If the connection is not successful ( 1430 -N), the database record is updated with information about the attempted connection ( 1435 ) and the next link is selected for processing ( 1480 ).
  • the link can be removed from the list of links scheduled to be included in a Webmaster's report ( 1440 ) and, assuming a certain degree of confidence has been achieved that the link has been restored to operational status, a message can be scheduled to each user reporting that the link previously broken has now been restored ( 1450 ).
  • a user may update the database to remove the broken link indication as previously discussed.
  • the display attributes of the document successfully connected to can be modified to show that the link has been healed ( 1460 ).
  • the database can be modified to show that the link has been healed ( 1470 ), and the next link selected ( 1480 ).
  • FIG. 15 is an illustration of a preferred way of displaying a healed link using sparkle.
  • the word in a document containing an information link which has been healed is displayed, it is typically displayed in a text box. It is the presentation attribute of this word which is modified to reflect the broken or healed status of the information link.
  • a healed link is displayed by surrounding the word with highlights 1510 as indicated.
  • each highlight is an embellishment which alternates between a first and second number of pixels, (such as 1 and 2 pixels in height (width)) on an ongoing basis, to give the word the appearance of being surrounded by sparkle. This animation calls the user's attention quickly to the healed link.
  • FIG. 16 is a flow chart of an exemplary process for cleaning up a database of broken links. This can be applied to either a user database or server database. Certain broken link reports result from sporadic events that may not be significant to a user once they reach a certain age. Thus, broken links which are older than a predetermined date, should be purged to avoid the accumulation of useless information. Similar considerations apply to a healed link. Periodically, one should begin a scan of all database entries which identify such links ( 1610 ). For each record identified, a determination should be made whether the date of the last report of its status is more than a certain period of time in the past, such as one month. If that date is older ( 1620 -Y), a record should be deleted 1630 and the next record considered.
  • the next record will be selected for consideration ( 1640 ).
  • a period of time will expire ( 1650 ), before old records are purged from the database again.
  • the one month cut off date illustrated in the example of FIG. 16 is arbitrary and can be set to any duration desired by a user.
  • FIG. 17 is a flow chart of an exemplary process for running a centralized link reporting service in accordance with one aspect of the invention.
  • a centralized server for processing broken link and healed link information.
  • Such a service will maintain a database like that shown in FIGS. 12A and 12B.
  • Users send broken link messages and healed link messages to the link service ( 1710 ) and the service server enters reports into the database ( 1720 ).
  • the link service then dispatches spiders to check on the status of the broken links ( 1730 ).
  • the link service also notifies subscribers who have reported a link down when a reported or requested link is healed ( 1740 ).
  • the link service can maintain data and compile reports on well maintained servers based on the information they maintain in their database ( 1750 ).
  • FIG. 18 is a flow chart of an exemplary process for use at a client to utilize a centralized link reporting service.
  • a user logs on to the network ( 1810 )
  • a user will be connected to a link service ( 1820 ) like that described in conjunction with FIG. 17 .
  • the user may then receive notification of any links he previously reported broken which have now been healed ( 1830 ).
  • the central service approach has the benefit that the collective experience of users reporting to the common service can be utilized to identify broken and healed links.
  • FIG. 19 is a flow chart of an alternative process for changing a display attribute for a link based on a probability that a connection to that link would succeed.
  • the particular display or presentation attribute to be applied to an information link it may be based on the number of attempts and the number of successes in connecting to that link. This can be utilized to develop a measure of probability that connection to a particular link will succeed ( 1910 ).
  • the link may then be presented with a presentation attribute which reflects the probability of success when retrieving a document identified by the information link ( 1920 ).
  • presentation is more general than display. It may be desirable to present information about a link and various ways, such as visual, audible or tactile. This presentation attribute can be modified to distinguish the same characteristics discussed in the various presentation media.
  • FIGS. 20A, 20 B and 20 C are exemplary flow charts of different processes for automatically removing document not found error messages.
  • One of the problems encountered with the document not found error message is that it affirmatively requires a user action to clear it. Typically, this involves centering a cursor over a “OK” button and clicking on that button to remove the message from the screen. This is singularly inconvenient for users when navigating an information space. It is particularly inconvenient because of the large number of broken links.
  • FIG. 20A when an document not found error message is generated ( 2010 ), it is not displayed on the screen but rather is synthesized as an audio response ( 2020 ) following which, if a visual message was displayed, it is automatically cleared ( 2030 ).
  • FIG. 20 B Another approach is illustrated in FIG. 20 B.
  • an eyetracker e.g. 176
  • T 1 would typically be sufficiently long for a user to be able to read the message, following which the error message would be cleared from the screen permitting the user to continue without the physical action necessary to clear the message of the prior art.

Abstract

Information links, such as hypertext links, found in network based documents, such as those found on the World Wide Web, sometimes break, i.e. fail to result in retrieval the desired document. Techniques are described to record information about such broken links and to provide relatively current information to a user whether a link was broken or, if previously broken, has been restored. A centralized broken link service is also described by which information about the status of links on the network can be gathered. A spider can be utilized to periodically check on whether links reported as broken have been restored.

Description

BACKGROUND OF THE INVENTION
1. Field of the Invention
The invention is directed to information systems and, more particularly, to the indication of broken and healed hypertext links in a network, such as the World Wide Web.
2. Description of Related Art
Large information networks, such as the World Wide Web are well-known in the art. Documents stored in such an information system contain hypertext links to related information.
3. The Problems
Navigating information systems such as the World Wide Web by using links can be a frustrating experience because many of these weblinks are “broken”, that is, they do not connect the user to the intended destination page. Instead, users receive an error message, such as “file not found.” Such errors create a suboptimal user experience when using these information systems.
Solving this problem is not easy. It is a time consuming and tedious job for the authors or maintainers of web pages to continually verify that all of the links in all of their documents are working.
SUMMARY OF THE INVENTION
The problems of the prior art are overcome by providing methods, apparatus, systems and computer program products for monitoring “file not found” error messages. When a user receives such an error message, it captures the URL and link information for the broken link and it generates a message to the website maintaining the document, that the link is not working. The display of such a broken link is modified at least at the client side of a client server interaction. Preferably, at the server's side, the code for the web page that has the broken link is retrieved and modified so that the broken link has a new visual appearance. Typically, this is modified by changing the mark-up language utilized for the page, such as HTML. The new visual appearance could take various forms. In this way, anyone who visits a web page after the system generates the replacement web page will see that the link was broken. The unique visual indication of a broken link will disappear whenever someone, typically a website owner or maintainer who has just fixed the problem clicks on the once-broken link and the destination page arrives successfully. Once this occurs, the visual and marker associated with the broken link is removed by generating a new page with the link displayed in the normal manner. Alternatively, a link once broken but currently functioning (a healed link) could be displayed in a manner designed to indicate to a user that the link has been healed.
The foregoing and other features, aspects and advantages of the present invention will become more apparent from the following detailed description of the present invention when taken in conjunction with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
The objects, features and advantages of the system of the present invention will be apparent from the following description in which:
FIG. 1A is a view of exemplary computer system suitable for use in carrying out the invention.
FIG. 1B is a block diagram of an exemplary hardware configuration of the computer of FIG. 1.
FIG. 1C is an illustration of an exemplary memory medium suitable for storing program and data information in accordance with the invention.
FIG. 1D is a block diagram of a network architecture suitable for carrying data and programs in accordance with some aspects of the invention.
FIG. 2 is a flow chart of an exemplary process used for handling broken information links in accordance with one embodiment of the invention.
FIG. 3 is a flow chart of an exemplary process for reporting a broken link.
FIG. 4 is an illustration of an exemplary message format for use in reporting broken and healed links in accordance with one embodiment of the invention.
FIG. 5 is a flow chart of an exemplary process for modifying the presentation or display attributes of a broken link at a server in accordance with one aspect of the invention.
FIG. 6 is a diagram of an exemplary database layout for a client process in accordance with one aspect of the invention.
FIG. 7 is a flow chart of an exemplary process for removing a broken link indication at a client when the link is healed.
FIG. 8 is a flow chart of an exemplary process for removing a broken link indication at a server when the link is healed.
FIG. 9 is a flow chart of an exemplary process for changing a presentation attribute of a link of a retrieved document.
FIG. 10 is a flow chart of an exemplary process for determining whether a link is broken.
FIG. 11 is a flow chart of an exemplary process for determining if a link is healed at a client in accordance with one embodiment of the invention.
FIGS. 12A and 12B represent an exemplary database layout for recording broken links and for gathering information on how well maintained a server site is.
FIG. 13 is a flow chart of an exemplary alternative process for handling broken links in accordance with one embodiment of the invention.
FIG. 14 is a flow chart of an exemplary spider process for periodically testing broken links.
FIG. 15 is an illustration of a preferred way to display a healed link using sparkle.
FIG. 16 is a flow chart of an exemplary process for cleaning up a database of broken links.
FIG. 17 is a flow chart of an exemplary process for running a centralized link reporting service in accordance with one aspect of the invention.
FIG. 18 is a flow chart of an exemplary process at a client for using a centralized link reporting service.
FIG. 19 is a flow chart of an alternative process for changing a display attribute for a link based on a probability that a connection to that link would succeed.
FIGS. 20A, 20B and 20C are exemplary flow charts of different processes for automatically removing document not found error messages.
NOTATIONS AND NOMENCLATURE
The detailed descriptions which follow may be presented in terms of program procedures executed on a computer or network of computers. These procedural descriptions and representations are the means used by those skilled in the art to most effectively convey the substance of their work to others skilled in the art.
A procedure is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. These steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It proves convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like. It should be noted, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities.
Further, the manipulations performed are often referred to in terms, such as adding or comparing, which are commonly associated with mental operations performed by a human operator. No such capability of a human operator is necessary, or desirable in most cases, in any of the operations described herein which form part of the present invention; the operations are machine operations. Useful machines for performing the operation of the present invention include general purpose digital computers or similar devices.
The present invention also relates to apparatus for performing these operations. This apparatus may be specially constructed for the required purpose or it may comprise a general purpose computer as selectively activated or reconfigured by a computer program stored in the computer. The procedures presented herein are not inherently related to a particular computer or other apparatus. Various general purpose machines may be used with programs written in accordance with the teachings herein, or it may prove more convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these machines will appear from the description given.
DESCRIPTION OF THE PREFERRED EMBODIMENT
FIG. 1A illustrates a computer of a type suitable for carrying out the invention. Viewed externally in FIG. 1A, a computer system has a central processing unit 100 having disk drives 110A and 110B. Disk drive indications 110A and 110B are merely symbolic of a number of disk drives which might be accommodated by the computer system. Typically, these would include a floppy disk drive such as 110A, a hard disk drive (not shown externally) and a CD ROM drive indicated by slot 110B. The number and type of drives varies, typically, with different computer configurations. The computer has the display 120 upon which information is displayed. A keyboard 130 and a mouse 140 are typically also available as input devices. Preferably, the computer illustrated in FIG. 1A is a SPARC™ workstation from Sun Microsystems, Inc.
FIG. 1B illustrates a block diagram of the internal hardware of the computer of FIG. 1A. A bus 150 serves as the main information highway interconnecting the other components of the computer. CPU 155 is the central processing unit of the system, performing calculations and logic operations required to execute programs. Read only memory (160) and random access memory (165) constitute the main memory of the computer. Disk controller 170 interfaces one or more disk drives to the system bus 150. These disk drives may be floppy disk drives, such as 173, internal or external hard drives, such as 172, or CD ROM or DVD (Digital Video Disks) drives such as 171. A display interface 125 interfaces a display 120 and permits information from the bus to be viewed on the display. An eyetracker 176 and a voice synthesizer 177 (with usual interfaces) are used in clearing error messages. Communications with external devices can occur over communications port 185.
FIG. 1C illustrates an exemplary memory medium which can be used with drives such as 173 in FIG. 1B or 110A in FIG. 1A. Typically, memory media such as a floppy disk, or a CD ROM, or a Digital Video Disk will contain the program information for controlling the computer to enable the computer to perform its functions in accordance with the invention.
FIG. 1D is a block diagram of a network architecture suitable for carrying data and programs in accordance with some aspects of the invention. A network 180 serves to connect a user computer 100 with either a server 185 or, alternatively, with server 190 for the download of program and data information.
FIG. 2 is a flow chart of an exemplary process used for handling broken information links in accordance with one embodiment of the invention. As shown therein, a user, such as user 100 or 100′ of FIG. 1D connects to server 1 (185) and requests download of a document, such as document 1 (200). For purposes of this illustration, document 1 contains a hypertext link to document 2 located on server 2 (210). This could be, for example, server 2 as shown at 190 in FIG. 1D. If a user desires to retrieve document 2, the user double clicks on an information link, such as a hypertext link, and a client process attempts to connect to server 2 where the desired document 2 is supposed to be located (220). If document 2 is available (230-Y), document 2 is retrieved and displayed (240). However, if document 2 is not available (230-N), the information link is considered broken, at least for the moment, and the broken link handling described more hereinafter is pursued (260).
There are several reasons why a document (sometimes called file or page) may not be available. For example, a communications link linking the requesting user to a server may be down. Alternatively, the server itself may be down for maintenance or because of malfunction. It may also be that document 2 has been removed from the server or the address for document 2 on that server has been changed. It may also be that document 2 has been moved to another server. As another example, the information link pointing to document 2 may contain a typographical error (in the HTML of document 1) which does not accurately point to document 2.
Some of these reasons for an information link being broken are merely temporary. Others, are substantially permanent.
FIG. 3 is a flow chart of an exemplary process for reporting a broken link. A document not found error message is generated, typically, in one of two ways. Either, a message is returned from the server containing the document requested indicating that it did not find the requested document or, alternatively, there may be no response at all in which case the local client process will detect a failure to respond and display a document not found error message. When such an error message is detected (300) the currently requested document information is placed in a message format, such as that shown in FIG. 4, in the broken link field (310). The currently requested document information is typically information formatted in a uniform resource locator (URL) format such as utilized on the World Wide Web. The URL information contains information identifying the server as well as the document located on the server to be retrieved. An information link in a document retrieved from a server typically contains the URL of the document pointed to so that the user may connect to the server on which that document resides and retrieve the document. When pursuing information links, it is customary to maintain a list of recently visited information links (i.e. their URL's). Thus, one can easily access the previously requested information link and place it in the message format, such as shown in FIG. 4 as the destination address (320). The network address of the user (or client) which receives the file not found error message is placed in the source address field of the message format of FIG. 4 (330). Then a broken link message is sent to the site which originated the page containing the broken link (340). Preferably, broken link information is concurrently stored in a broken link database such as that shown in FIG. 6.
FIG. 4 is an illustration of an exemplary message format for use in reporting broken and healed links in accordance with one aspect of the invention. The message is formatted as a packet 400 including a header 410 and a broken link identifier 420. The header portion of the message format includes, preferably, at least three components. First, a message type which distinguishes at least two types of messages, namely a broken link report and a repaired or healed link report. The source address, or the address of the user or process reporting the broken link is placed in the source address portion of the header. The destination address is the address of the server from which the document containing the broken link was retrieved. The broken link identifier 420 contains the URL of the document, the retrieval of which failed.
FIG. 5 is a flow chart of an exemplary process for modifying display of a broken link at a server in accordance with one aspect of the invention. When a server receives a broken link message from the user as discussed in conjunction with item 340 of FIG. 3, (500), the server retrieves the document identified as containing a broken link and modifies a presentation attribute of the broken link and stores a modified document (510). As shown in FIG. 4, the destination address for the message is the server in which the document is located which contains a broken link. When that document is retrieved, it is scanned to identify text which corresponds to the broken link identified in field 420 of the message. When the information link is identified, its attributes are modified by modifying the HTML code associated with the information link to change the presentation. For example, the color can change from its normal presentation (commonly blue) to a color indicating a broken link, such as red or yellow. Alternatively, the presentation of the link which has been reported broken can be changed by placing an icon before, after or both before and after the information link to identify the fact that the link has been determined to be broken. Once the HTML code has been modified, the modified code is stored on the server, so that any user accessing that document and displaying it will receive a document which has been modified to highlight the fact that the particular information link has been determined to be broken.
FIG. 6 is a diagram of an exemplary database layout for a client process in accordance with one aspect of the invention. As discussed in conjunction with FIG. 3, at 350, broken link information identified by a user is stored in a local database. Database layout 600 is an exemplary form of storing that information. The information contains a field 610 listing broken links and a field 620 showing the date and time at which the broken status of the link was identified. The use of this database in conjunction with the client process permits a local user to have the functionality of broken link identification whether or not servers are equipped to modify the presentation of a document containing a broken link. The data field 620 as shown in FIG. 6 can be utilized for implementing various clean-up policies for removing stale entries from the database, should that be desired.
FIG. 7 is a flow chart of an exemplary process for removing a broken link indication at a client when the link is healed. When a page has been retrieved which contains a broken link (710) as indicated by, for example, its presence in the local database shown in FIG. 6 or by virtue of presentation from a server equipped to identify broken links, when a user clicks on a link identified as broken, if the requested document is successfully retrieved (720), the link will be removed from the local database of broken links (730) shown in FIG. 6 and a message will be formulated and sent to the site which originated the document containing the broken link that the link has been repaired (740) using the message format of FIG. 4. If the server is not equipped to mark links which have been broken and healed, the message will simply be ignored. However, the broken indication will be removed from the local database so that the information link which was previously listed and displayed broken, will now be displayed as normal.
FIG. 8 is a flow chart of an exemplary process for removing a broken link indication at a server when the link is healed. When a server receives the link restored message (810), using, for example, the message format of FIG. 4, the site retrieves the document identified as containing a broken link and modifies the presentation attribute of the broken link and stores a modified (restored) document (820).
When a link is healed, it is preferable to display the link in a modified form which distinguishes it from links which have never been broken and from broken links. One form of displaying a healed link is discussed in conjunction with FIG. 15, hereinafter.
FIG. 9 is a flow chart of an exemplary process for changing a presentation attribute of links in a retrieved document on the client's side. When a document is retrieved from a server (910), a check of the downloaded mark-up language, such as HTML, is made to determine whether there are any information links in the document retrieved which have broken or healed display attributes. If there are (920-Y), the local database is updated to contain information about those links (930). If there are no such information links having broken or healed display attributes (920-N), a check is made to see if any of the information links in the document are contained in the local database (940). If they are, they are displayed with a presentation attribute appropriate to the broken/healed status specified in the database (950). In this way, broken and healed link information received from the server can be combined with that determined locally in the local database so that the link status information presented to a user reflects the latest information.
FIG. 10 is a flow chart of an exemplary process for determining whether a link is broken. When a document is requested (1010), a timer is set (1020) and a check is made to determine whether or not the document is being received (1030). If it is, the document is indicated as available (1030-Y). If it is not, (1030-N), a check is made to see if the timer has expired (1040). If it has not, (1040-N), after a certain period of time (1045), a check is repeated to see if a document is being received. If the timer has expired, (1040-Y), the document is considered not available (1030-N).
FIG. 11 is a flow chart of an exemplary process for determining if a link is healed at a server in accordance with one embodiment of the invention. When a user such as a Webmaster or maintenance person of a site clicks on a link marked as broken in the database (1110), if the connection is successful (1120), the database maintained will be changed to show that the link is healed (1130). This is a simplified version of the process shown in FIG. 7 which is preferred for use at a server.
FIGS. 12A and 12B represent an exemplary database layout for recording broken links and for gathering information on how well maintained a server site is. When a link has been reported as broken by a user to a server, the server can preferably maintain certain information about the broken link. This information is shown in FIGS. 12A and 12B. Field 1210 will store the identifier of the document located on the server containing the broken link. The broken link itself will be identified in field 1220. Field 1230 contains an indication of the number of attempts made to connect to the particular link identified as broken. These can either be attempts initiated by the server or the number of reports received from users in the message format, or both. Field 1220 is an indication of the number of attempts that were successful. This field is used mainly in conjunction with certain embodiments described hereinafter. The date and time of the first attempt (1250) and the date and time of the last attempt (1260) made to connect to the broken link are recorded. Field 1270 contains a list of each user reporting that that particular link is broken.
One use for field 1230 of database 1200 is to identify for a particular broken link, how many attempts have been made to connect to the site. If only one attempt by one user has failed, it may be desirable to indicate the relative uncertainty of the information with a particular presentation attribute for the link stored in a document at the site, such as attribute 1. If there were two attempts separated by more than an hour, there may be greater confidence that the link is broken and this may be indicated by a different attribute, such as attribute 2. If there were two or more attempts separated by twenty-four hours, it may be desirable to display the broken link with a different attribute, such as attribute 3. The time elapsed between a first and last report may be indicated by fields 1250 and 1260. Thus, different attributes may specify the degree of severity of outage of a broken link.
FIG. 13 is a flow chart of an exemplary alternative process for handling broken links in accordance with an embodiment of the invention. When a message is received from a user that a link maintained on the server is broken (1310), this report is entered in the database (1320), such as the database shown in FIG. 12. If there is more than one independent report of a broken status for the link being reported (1330), the display attribute will be modified to show the broken link (1340). This broken link report can then be scheduled for inclusion in a report to the web master of the site containing the document having a broken link (1350). In addition, the report will trigger scheduling of a spider to check periodically for whether the document identified by the broken link report can be accessed and the result of that attempted access stored in the database (1360). If there is only one independent report of a broken link (1330-N), no action will be taken unless independent confirmation is received.
FIG. 14 is a flow chart of an exemplary spider process for periodically testing broken links. The process retrieves a list of broken links from the database (1410), preferably the database shown in FIGS. 12A and 12B. For each link, the spider attempts a connection (1420). If the connection is not successful (1430-N), the database record is updated with information about the attempted connection (1435) and the next link is selected for processing (1480). If the connection is successful (1430-Y), the link can be removed from the list of links scheduled to be included in a Webmaster's report (1440) and, assuming a certain degree of confidence has been achieved that the link has been restored to operational status, a message can be scheduled to each user reporting that the link previously broken has now been restored (1450). A user, receiving such a message, may update the database to remove the broken link indication as previously discussed. In addition, the display attributes of the document successfully connected to can be modified to show that the link has been healed (1460). In addition, the database can be modified to show that the link has been healed (1470), and the next link selected (1480).
FIG. 15 is an illustration of a preferred way of displaying a healed link using sparkle. When the word in a document containing an information link which has been healed is displayed, it is typically displayed in a text box. It is the presentation attribute of this word which is modified to reflect the broken or healed status of the information link. In the preferred form of the invention, a healed link is displayed by surrounding the word with highlights 1510 as indicated. In an exemplary form, each highlight is an embellishment which alternates between a first and second number of pixels, (such as 1 and 2 pixels in height (width)) on an ongoing basis, to give the word the appearance of being surrounded by sparkle. This animation calls the user's attention quickly to the healed link.
FIG. 16 is a flow chart of an exemplary process for cleaning up a database of broken links. This can be applied to either a user database or server database. Certain broken link reports result from sporadic events that may not be significant to a user once they reach a certain age. Thus, broken links which are older than a predetermined date, should be purged to avoid the accumulation of useless information. Similar considerations apply to a healed link. Periodically, one should begin a scan of all database entries which identify such links (1610). For each record identified, a determination should be made whether the date of the last report of its status is more than a certain period of time in the past, such as one month. If that date is older (1620-Y), a record should be deleted 1630 and the next record considered. If the date of the last report is less than the cut off age (1620-N), the next record will be selected for consideration (1640). When all records have been selected, a period of time will expire (1650), before old records are purged from the database again. The one month cut off date illustrated in the example of FIG. 16 is arbitrary and can be set to any duration desired by a user.
FIG. 17 is a flow chart of an exemplary process for running a centralized link reporting service in accordance with one aspect of the invention. Rather than utilizing a spider process at each server, it may be desirable to maintain a centralized server for processing broken link and healed link information. Such a service will maintain a database like that shown in FIGS. 12A and 12B. Users send broken link messages and healed link messages to the link service (1710) and the service server enters reports into the database (1720). The link service then dispatches spiders to check on the status of the broken links (1730). The link service also notifies subscribers who have reported a link down when a reported or requested link is healed (1740). In addition, the link service can maintain data and compile reports on well maintained servers based on the information they maintain in their database (1750).
FIG. 18 is a flow chart of an exemplary process for use at a client to utilize a centralized link reporting service. When a user logs on to the network (1810), a user will be connected to a link service (1820) like that described in conjunction with FIG. 17. The user may then receive notification of any links he previously reported broken which have now been healed (1830). The central service approach has the benefit that the collective experience of users reporting to the common service can be utilized to identify broken and healed links.
FIG. 19 is a flow chart of an alternative process for changing a display attribute for a link based on a probability that a connection to that link would succeed. In this approach, when determining the particular display or presentation attribute to be applied to an information link, it may be based on the number of attempts and the number of successes in connecting to that link. This can be utilized to develop a measure of probability that connection to a particular link will succeed (1910). The link may then be presented with a presentation attribute which reflects the probability of success when retrieving a document identified by the information link (1920). One should note that presentation is more general than display. It may be desirable to present information about a link and various ways, such as visual, audible or tactile. This presentation attribute can be modified to distinguish the same characteristics discussed in the various presentation media. FIGS. 20A, 20B and 20C are exemplary flow charts of different processes for automatically removing document not found error messages. One of the problems encountered with the document not found error message is that it affirmatively requires a user action to clear it. Typically, this involves centering a cursor over a “OK” button and clicking on that button to remove the message from the screen. This is singularly inconvenient for users when navigating an information space. It is particularly inconvenient because of the large number of broken links. In FIG. 20A, when an document not found error message is generated (2010), it is not displayed on the screen but rather is synthesized as an audio response (2020) following which, if a visual message was displayed, it is automatically cleared (2030).
Another approach is illustrated in FIG. 20B. When the document not found error message is displayed (2010), an eyetracker (e.g. 176) is utilized to detect that the user's eyes have looked at the message for a duration, such as T1 (2040). T1 would typically be sufficiently long for a user to be able to read the message, following which the error message would be cleared from the screen permitting the user to continue without the physical action necessary to clear the message of the prior art.
In a third approach, when the document not found error message is displayed (2010), a timer is set (2050) following expiration of which, the error message is cleared automatically (2030).
In the manner indicated, the problems as found in the prior art with the respect to the handling of document not found error messages are significantly alleviated and user experience in navigating an information space is greatly enhanced.
Although the present invention has been described and illustrated in detail, it is clearly understood that the same is by way of illustration and example only and is not to be taken by way of limitation, the spirit and scope of the present invention being limited only by the terms of the appended claims and their equivalents.

Claims (20)

What is claimed is:
1. Computer apparatus, comprising:
a. a communications interface; and
b. a computer, connected to said communications interface, configured to detect an indication that a document requested over said communications interface using an information link has not been found, to store information indicating said link was not found, to change a presentation attribute of said link when said link is contained in a document received over said communications interface, and to modify said presentation attribute when a successful connection to said document is achieved.
2. The computer apparatus of claim 1 in which said computer is further configured to delete said information indicating said link was not found when a successful connection to said document is achieved.
3. The computer apparatus of claim 1 in which said computer is further configured to send a message to a server from which a document was retrieved which contained said information link indicating that a document requested using said information link was not found.
4. The computer apparatus of claim 1 in which said computer is further configured to change the presentation attributes of information links contained in documents received over said communications interface when information is stored about one or more of said links.
5. The computer apparatus of claim 4 in which said computer is further configured to send a message to a server indicating that a document was successfully retrieved using an information link which had previously been the subject of a message to said server.
6. Computer apparatus, comprising:
a. a communications interface; and
b. a computer, connected to said communications interface, configured to receive at least one message over said communications interface identifying a document stored on said computer, and to modify a presentation attribute of at least one information link contained in said document in response to said message.
7. The computer apparatus of claim 6 in which said computer is further configured to store information about information links received in messages over said communications interface.
8. The computer apparatus of claim 6 in which said messages comprise reports that an information link contained in a document stored on said computer apparatus did not result in a connection.
9. The computer apparatus of claim 6 in which said messages comprise reports that an information link contained in a document stored on said computer apparatus did result in a connection after having been previously reported as not resulting in a connection.
10. The computer apparatus of claim 6 in which the information about information links is stored in a database.
11. The computer apparatus of claim 6 in which said computer is further configured to run a spider process the check on the status of information links contained in documents stored on said computer apparatus.
12. The computer apparatus of claim 6 in which said computer is further configured to run a spider process the check on the status of information links contained in documents stored on said computer apparatus reported to be broken.
13. The computer apparatus of claim 6 in which said computer is further configured to send a message to any computer reporting a broken information link indicating that the link previously reported as broken has been healed when at least one message has been received indicating successful access to a document identified by said information link.
14. A system for information retrieval, comprising:
a. a network;
b. at least one server computer apparatus, connected to said network, storing documents and configured to deliver a document across the network in response to a document request; and
c. at least one client computer apparatus, connected to said network, configured to send a message to a server computer apparatus from which a document containing an information link was received when a document requested using said information link was not found.
15. A method of handling information links which do not result in retrieval of a document pointed to by the information link, comprising the steps of:
a. detecting an indication that a document requested using an information link has not been found; and
b. sending a message to another device indicating said link was not found.
16. A method of storing information about information links which are not functioning, comprising the steps of:
a. receiving a message indicating an information link contained in a document is not working;
b. retrieving said document;
c. modifying a presentation attribute of said information link in said document; and
d. storing said document in modified form.
17. A method of gathering information about non-functional information links in documents stored on network devices, comprising the steps of:
a. receiving messages at a network device from one or more network devices indicating that a particular information link pointing to a different network device is not functioning; and
b. storing information from said messages.
18. A computer program product comprising:
a. a memory medium; and
b. a computer program stored on said memory medium, said computer program comprising instructions for detecting an indication that a document requested using an information link has not been found and for sending a message to another device indicating said link was not found.
19. A computer program product comprising:
a. a memory medium; and
b. a computer program stored on said memory medium, said computer program comprising instructions for receiving a message indicating an information link contained in a document is not working, for retrieving said document, for modifying a presentation attribute of said information link in said document and for storing said document in modified form.
20. A computer program product comprising:
a. a memory medium; and
b. a computer program stored on said memory medium, said computer program comprising instructions for receiving messages at a network device from one or more network devices indicating that a particular information link pointing to a different network device is not functioning and storing information from said messages.
US08/992,407 1997-12-17 1997-12-17 Restoring broken links utilizing a spider process Expired - Lifetime US6253204B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US08/992,407 US6253204B1 (en) 1997-12-17 1997-12-17 Restoring broken links utilizing a spider process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US08/992,407 US6253204B1 (en) 1997-12-17 1997-12-17 Restoring broken links utilizing a spider process

Publications (1)

Publication Number Publication Date
US6253204B1 true US6253204B1 (en) 2001-06-26

Family

ID=25538310

Family Applications (1)

Application Number Title Priority Date Filing Date
US08/992,407 Expired - Lifetime US6253204B1 (en) 1997-12-17 1997-12-17 Restoring broken links utilizing a spider process

Country Status (1)

Country Link
US (1) US6253204B1 (en)

Cited By (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6408296B1 (en) * 1998-09-01 2002-06-18 Lucent Technologies Inc. Computer implemented method and apparatus for enhancing access to a file
US20020103920A1 (en) * 2000-11-21 2002-08-01 Berkun Ken Alan Interpretive stream metadata extraction
US20020112045A1 (en) * 2000-12-15 2002-08-15 Vivek Nirkhe User name mapping
US20020133535A1 (en) * 2001-03-14 2002-09-19 Microsoft Corporation Identity-centric data access
WO2002091193A1 (en) * 2001-05-04 2002-11-14 International Business Machines Corporation Web page annotation systems
US20030041305A1 (en) * 2001-07-18 2003-02-27 Christoph Schnelle Resilient data links
US20030084143A1 (en) * 2001-10-31 2003-05-01 Herbert Knoesel Resource locator management system and method
US20030084095A1 (en) * 2001-10-26 2003-05-01 Hayden Douglas Todd Method to preserve web page links using registration and notification
US6558431B1 (en) * 1998-09-11 2003-05-06 Macromedia, Inc. Storing valid and invalid markup language in strict and relaxed tables respectively
US20030093400A1 (en) * 2001-11-13 2003-05-15 International Business Machines Corporation Method for updating a database from a browser
US6578078B1 (en) * 1999-04-02 2003-06-10 Microsoft Corporation Method for preserving referential integrity within web sites
US20030115172A1 (en) * 2001-12-13 2003-06-19 Mangalvedhekar Sunit B. Electronic file management
US20030115171A1 (en) * 2001-12-13 2003-06-19 Mangalvedhekar Sunit B. Electronic files preparation for storage in a server
US20030131069A1 (en) * 2001-03-14 2003-07-10 Lucovsky Mark H. Schema-based context service
US20030131005A1 (en) * 2002-01-10 2003-07-10 International Business Machines Corporation Method and apparatus for automatic pruning of search engine indices
US6606653B1 (en) * 1999-10-07 2003-08-12 International Business Machines Corporation Updating of embedded links in World Wide Web source pages to have the new URLs of their linked target Web pages after such target Web pages have been moved
US20030158953A1 (en) * 2002-02-21 2003-08-21 Lal Amrish K. Protocol to fix broken links on the world wide web
US20030182417A1 (en) * 2002-03-25 2003-09-25 Fujitsu Limited Web server managing method, program and recording medium
US6631496B1 (en) * 1999-03-22 2003-10-07 Nec Corporation System for personalizing, organizing and managing web information
US6638314B1 (en) * 1998-06-26 2003-10-28 Microsoft Corporation Method of web crawling utilizing crawl numbers
US20040002976A1 (en) * 2002-06-28 2004-01-01 Lucovsky Mark H. Schema-based services for identity-based data access to favorite website data
US20040047596A1 (en) * 2000-10-31 2004-03-11 Louis Chevallier Method for processing video data designed for display on a screen and device therefor
US20040083424A1 (en) * 2002-10-17 2004-04-29 Nec Corporation Apparatus, method, and computer program product for checking hypertext
US6763496B1 (en) 1999-03-31 2004-07-13 Microsoft Corporation Method for promoting contextual information to display pages containing hyperlinks
US20040138946A1 (en) * 2001-05-04 2004-07-15 Markus Stolze Web page annotation systems
US20040143787A1 (en) * 2002-06-19 2004-07-22 Constantine Grancharov Method and system for resolving universal resource locators (URLs) from script code
US20040158429A1 (en) * 2003-02-10 2004-08-12 Bary Emad Abdel Method and system for classifying content and prioritizing web site content issues
US20040205810A1 (en) * 2000-05-08 2004-10-14 Matheny John R. System and method for encouraging viewers to watch television programs
US6823379B1 (en) * 1999-09-03 2004-11-23 International Business Machines Corporation System and method for web or file system asset management and visualization
US20040267726A1 (en) * 2003-06-28 2004-12-30 International Business Machines Corporation Hypertext request integrity and user experience
US20050028081A1 (en) * 2000-06-23 2005-02-03 Microsoft Corporation System and method for facilitating the design of a website
US20050044571A1 (en) * 1998-05-29 2005-02-24 Goldman Phillip Y. Method and apparatus for displaying HTML and video simultaneously
US6895551B1 (en) * 1999-09-23 2005-05-17 International Business Machines Corporation Network quality control system for automatic validation of web pages and notification of author
US20050120292A1 (en) * 2003-11-28 2005-06-02 Fuji Xerox Co., Ltd. Device, method, and computer program product for generating information of link structure of documents
US20050165773A1 (en) * 2001-03-14 2005-07-28 Microsoft Corporation Executing dynamically assigned functions while providing services
US20050289446A1 (en) * 2004-06-23 2005-12-29 Moncsko Cynthia A System and method for management of document cross-reference links
US20060036636A1 (en) * 2004-08-13 2006-02-16 Small Jason K Distributed object-based storage system that uses pointers stored as object attributes for object analysis and monitoring
US20060117249A1 (en) * 2004-11-29 2006-06-01 Hu Xiao W Document editor and method for editing document
US20060161561A1 (en) * 2005-01-20 2006-07-20 Stanley Tsai Broken Hyperlink auto-redirection and management system and method
US7100109B1 (en) * 2002-06-17 2006-08-29 Microsoft Corporation Identifying URL references in script included in markup language documents
US7216297B1 (en) * 2000-09-22 2007-05-08 At&T Corp. Eliding web page content
US20070107030A1 (en) * 1998-06-17 2007-05-10 Microsoft Corporation Combining real-time and batch mode logical address links
US20080016025A1 (en) * 2003-06-28 2008-01-17 Beynon Margaret A R Guaranteeing hypertext link integrity
US20080082634A1 (en) * 1998-09-29 2008-04-03 Netscape Communications Corporation Selecting a dtd for transforming malformed layout expressions into wellformed ones
US20080120533A1 (en) * 2006-11-20 2008-05-22 Microsoft Corporation Handling external content in web applications
US20080235565A1 (en) * 2007-03-21 2008-09-25 International Business Machines Corporation System and Method for Reference Validation in Word Processor Documents
US20080301802A1 (en) * 2000-05-24 2008-12-04 International Business Machines Corporation Trust-Based Link Access Control
US20090172154A1 (en) * 2007-12-31 2009-07-02 International Business Machines Corporation Method for autonomic detection and repair of broken links in web environments
US20110029861A1 (en) * 2009-07-30 2011-02-03 International Business Machines Corporation Generating Simulated Containment Reports of Dynamically Assembled Components in a Content Management System
US20110153631A1 (en) * 2009-12-23 2011-06-23 Kondasani Thakur B Methods and systems for detecting broken links within a file
US20110238745A1 (en) * 2008-12-25 2011-09-29 Kyocera Corporation Communication device, web server apparatus and communication system
US20110264757A1 (en) * 2010-04-21 2011-10-27 International Business Machines Corporation Notice of restored malfunctioning links
US20120059929A1 (en) * 2010-09-02 2012-03-08 Oracle International Corporation Techniques for maintaining current content
US20120151323A1 (en) * 2010-12-10 2012-06-14 International Business Machines Corporation System, method, and computer program product for management of web page links
US8341177B1 (en) * 2006-12-28 2012-12-25 Symantec Operating Corporation Automated dereferencing of electronic communications for archival
US8341687B2 (en) 1999-04-07 2012-12-25 Microsoft Corporation Communicating scripts in a data service channel of a video signal
US8595475B2 (en) 2000-10-24 2013-11-26 AOL, Inc. Method of disseminating advertisements using an embedded media player page
US8671108B2 (en) 2011-09-02 2014-03-11 Mastercard International Incorporated Methods and systems for detecting website orphan content
US20140108901A1 (en) * 2012-10-17 2014-04-17 International Business Machines Corporation Web Browser Bookmark Reconciliation
US20140122384A1 (en) * 2012-10-31 2014-05-01 Disruptdev, Llc D/B/A Trails.By System and method for visually tracking a learned process
US20140181633A1 (en) * 2012-12-20 2014-06-26 Stanley Mo Method and apparatus for metadata directed dynamic and personal data curation
US8918812B2 (en) 2000-10-24 2014-12-23 Aol Inc. Method of sizing an embedded media player page
US9021529B2 (en) 2004-07-15 2015-04-28 Microsoft Technology Licensing, Llc Content recordation techniques
US20150358397A1 (en) * 2013-01-28 2015-12-10 British Telecommunications Public Limited Company Distributed system
US9460421B2 (en) 2001-03-14 2016-10-04 Microsoft Technology Licensing, Llc Distributing notifications to multiple recipients via a broadcast list
US20160373332A1 (en) * 2015-06-18 2016-12-22 International Business Machines Corporation Web site reachability management for content browsing
CN106557334A (en) * 2015-09-25 2017-04-05 北京国双科技有限公司 Determination methods and device that reptile task is completed
US9633356B2 (en) 2006-07-20 2017-04-25 Aol Inc. Targeted advertising for playlists based upon search queries
US9886309B2 (en) 2002-06-28 2018-02-06 Microsoft Technology Licensing, Llc Identity-based distributed computing for device resources
US20210204132A1 (en) * 2016-09-02 2021-07-01 Blink.Cloud LLC Media agnostic content access management
US11361046B2 (en) * 2016-10-17 2022-06-14 Google Llc Machine learning classification of an application link as broken or working

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5761683A (en) * 1996-02-13 1998-06-02 Microtouch Systems, Inc. Techniques for changing the behavior of a link in a hypertext document
US5822533A (en) * 1995-05-24 1998-10-13 Fuji Xerox Co., Ltd. Information tracing system and information tracing method
US5835712A (en) * 1996-05-03 1998-11-10 Webmate Technologies, Inc. Client-server system using embedded hypertext tags for application and database development
US5875302A (en) * 1997-05-06 1999-02-23 Northern Telecom Limited Communication management system having communication thread structure including a plurality of interconnected threads
US5884309A (en) * 1995-12-06 1999-03-16 Dynamic Web Transaction Systems, Inc. Order entry system for internet
US5894554A (en) * 1996-04-23 1999-04-13 Infospinner, Inc. System for managing dynamic web page generation requests by intercepting request at web server and routing to page server thereby releasing web server to process other requests
US5907680A (en) * 1996-06-24 1999-05-25 Sun Microsystems, Inc. Client-side, server-side and collaborative spell check of URL's
US5958008A (en) * 1996-10-15 1999-09-28 Mercury Interactive Corporation Software system and associated methods for scanning and mapping dynamically-generated web documents
US5974572A (en) * 1996-10-15 1999-10-26 Mercury Interactive Corporation Software system and methods for generating a load test using a server access log
US5999929A (en) * 1997-09-29 1999-12-07 Continuum Software, Inc World wide web link referral system and method for generating and providing related links for links identified in web pages
US6021439A (en) * 1997-11-14 2000-02-01 International Business Machines Corporation Internet quality-of-service method and system
US6035330A (en) * 1996-03-29 2000-03-07 British Telecommunications World wide web navigational mapping system and method
US6049799A (en) * 1997-05-12 2000-04-11 Novell, Inc. Document link management using directory services

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5822533A (en) * 1995-05-24 1998-10-13 Fuji Xerox Co., Ltd. Information tracing system and information tracing method
US5884309A (en) * 1995-12-06 1999-03-16 Dynamic Web Transaction Systems, Inc. Order entry system for internet
US5761683A (en) * 1996-02-13 1998-06-02 Microtouch Systems, Inc. Techniques for changing the behavior of a link in a hypertext document
US6035330A (en) * 1996-03-29 2000-03-07 British Telecommunications World wide web navigational mapping system and method
US5894554A (en) * 1996-04-23 1999-04-13 Infospinner, Inc. System for managing dynamic web page generation requests by intercepting request at web server and routing to page server thereby releasing web server to process other requests
US5835712A (en) * 1996-05-03 1998-11-10 Webmate Technologies, Inc. Client-server system using embedded hypertext tags for application and database development
US5907680A (en) * 1996-06-24 1999-05-25 Sun Microsystems, Inc. Client-side, server-side and collaborative spell check of URL's
US5958008A (en) * 1996-10-15 1999-09-28 Mercury Interactive Corporation Software system and associated methods for scanning and mapping dynamically-generated web documents
US5974572A (en) * 1996-10-15 1999-10-26 Mercury Interactive Corporation Software system and methods for generating a load test using a server access log
US5875302A (en) * 1997-05-06 1999-02-23 Northern Telecom Limited Communication management system having communication thread structure including a plurality of interconnected threads
US6049799A (en) * 1997-05-12 2000-04-11 Novell, Inc. Document link management using directory services
US5999929A (en) * 1997-09-29 1999-12-07 Continuum Software, Inc World wide web link referral system and method for generating and providing related links for links identified in web pages
US6021439A (en) * 1997-11-14 2000-02-01 International Business Machines Corporation Internet quality-of-service method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
The Internet, "SiteSweeper helps clean up Web management" by Kim S. Nash; ComputerWorld, pp. 1-2, Oct. 7, 1996. *

Cited By (131)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050044571A1 (en) * 1998-05-29 2005-02-24 Goldman Phillip Y. Method and apparatus for displaying HTML and video simultaneously
US20070107030A1 (en) * 1998-06-17 2007-05-10 Microsoft Corporation Combining real-time and batch mode logical address links
US7765575B2 (en) * 1998-06-17 2010-07-27 Microsoft Corporation Combining real-time and batch mode logical address links
US6638314B1 (en) * 1998-06-26 2003-10-28 Microsoft Corporation Method of web crawling utilizing crawl numbers
US6408296B1 (en) * 1998-09-01 2002-06-18 Lucent Technologies Inc. Computer implemented method and apparatus for enhancing access to a file
US6558431B1 (en) * 1998-09-11 2003-05-06 Macromedia, Inc. Storing valid and invalid markup language in strict and relaxed tables respectively
US20080082634A1 (en) * 1998-09-29 2008-04-03 Netscape Communications Corporation Selecting a dtd for transforming malformed layout expressions into wellformed ones
US20130132822A1 (en) * 1998-09-29 2013-05-23 Rick Gessner Selecting a dtd for transforming malformed layout expressions into wellformed ones
US6631496B1 (en) * 1999-03-22 2003-10-07 Nec Corporation System for personalizing, organizing and managing web information
US20040215664A1 (en) * 1999-03-31 2004-10-28 Microsoft Corporation Method for promoting contextual information to display pages containing hyperlinks
US6763496B1 (en) 1999-03-31 2004-07-13 Microsoft Corporation Method for promoting contextual information to display pages containing hyperlinks
US7168034B2 (en) * 1999-03-31 2007-01-23 Microsoft Corporation Method for promoting contextual information to display pages containing hyperlinks
US7392303B2 (en) * 1999-04-02 2008-06-24 Microsoft Corporation Method for preserving referential integrity within web sites
US6578078B1 (en) * 1999-04-02 2003-06-10 Microsoft Corporation Method for preserving referential integrity within web sites
US20040024848A1 (en) * 1999-04-02 2004-02-05 Microsoft Corporation Method for preserving referential integrity within web sites
US8341687B2 (en) 1999-04-07 2012-12-25 Microsoft Corporation Communicating scripts in a data service channel of a video signal
US6823379B1 (en) * 1999-09-03 2004-11-23 International Business Machines Corporation System and method for web or file system asset management and visualization
US6895551B1 (en) * 1999-09-23 2005-05-17 International Business Machines Corporation Network quality control system for automatic validation of web pages and notification of author
US6606653B1 (en) * 1999-10-07 2003-08-12 International Business Machines Corporation Updating of embedded links in World Wide Web source pages to have the new URLs of their linked target Web pages after such target Web pages have been moved
US7840975B2 (en) 2000-05-08 2010-11-23 Microsoft Corporation System and method for encouraging viewers to watch television programs
US20040205810A1 (en) * 2000-05-08 2004-10-14 Matheny John R. System and method for encouraging viewers to watch television programs
US20080301802A1 (en) * 2000-05-24 2008-12-04 International Business Machines Corporation Trust-Based Link Access Control
US20050028081A1 (en) * 2000-06-23 2005-02-03 Microsoft Corporation System and method for facilitating the design of a website
US7287215B2 (en) * 2000-06-23 2007-10-23 Microsoft Corporation System and method for facilitating the design of a website
US20100023493A1 (en) * 2000-09-22 2010-01-28 Frederick Douglis Methods, Systems & Products for Generating Web Pages
US7620898B1 (en) 2000-09-22 2009-11-17 Frederick Douglis Eliding web page content
US7216297B1 (en) * 2000-09-22 2007-05-08 At&T Corp. Eliding web page content
US9020904B2 (en) * 2000-09-22 2015-04-28 Rpx Corporation Methods, systems and products for generating web pages
US9595050B2 (en) 2000-10-24 2017-03-14 Aol Inc. Method of disseminating advertisements using an embedded media player page
US8819404B2 (en) 2000-10-24 2014-08-26 Aol Inc. Method of disseminating advertisements using an embedded media player page
US8595475B2 (en) 2000-10-24 2013-11-26 AOL, Inc. Method of disseminating advertisements using an embedded media player page
US8918812B2 (en) 2000-10-24 2014-12-23 Aol Inc. Method of sizing an embedded media player page
US9454775B2 (en) 2000-10-24 2016-09-27 Aol Inc. Systems and methods for rendering content
US20040047596A1 (en) * 2000-10-31 2004-03-11 Louis Chevallier Method for processing video data designed for display on a screen and device therefor
US20020103920A1 (en) * 2000-11-21 2002-08-01 Berkun Ken Alan Interpretive stream metadata extraction
US7752186B2 (en) 2000-11-21 2010-07-06 Aol Inc. Grouping multimedia and streaming media search results
US8095529B2 (en) 2000-11-21 2012-01-10 Aol Inc. Full-text relevancy ranking
US8209311B2 (en) 2000-11-21 2012-06-26 Aol Inc. Methods and systems for grouping uniform resource locators based on masks
US20070130131A1 (en) * 2000-11-21 2007-06-07 Porter Charles A System and process for searching a network
US20110004604A1 (en) * 2000-11-21 2011-01-06 AOL, Inc. Grouping multimedia and streaming media search results
US7925967B2 (en) 2000-11-21 2011-04-12 Aol Inc. Metadata quality improvement
US8700590B2 (en) 2000-11-21 2014-04-15 Microsoft Corporation Grouping multimedia and streaming media search results
US8117254B2 (en) * 2000-12-15 2012-02-14 Microsoft Corporation User name mapping in a heterogeneous network
US20020112045A1 (en) * 2000-12-15 2002-08-15 Vivek Nirkhe User name mapping
US20030131069A1 (en) * 2001-03-14 2003-07-10 Lucovsky Mark H. Schema-based context service
US9413817B2 (en) 2001-03-14 2016-08-09 Microsoft Technology Licensing, Llc Executing dynamically assigned functions while providing services
US9460421B2 (en) 2001-03-14 2016-10-04 Microsoft Technology Licensing, Llc Distributing notifications to multiple recipients via a broadcast list
US8572576B2 (en) 2001-03-14 2013-10-29 Microsoft Corporation Executing dynamically assigned functions while providing services
US20050165773A1 (en) * 2001-03-14 2005-07-28 Microsoft Corporation Executing dynamically assigned functions while providing services
US7539747B2 (en) 2001-03-14 2009-05-26 Microsoft Corporation Schema-based context service
US20020133535A1 (en) * 2001-03-14 2002-09-19 Microsoft Corporation Identity-centric data access
WO2002091193A1 (en) * 2001-05-04 2002-11-14 International Business Machines Corporation Web page annotation systems
US20040138946A1 (en) * 2001-05-04 2004-07-15 Markus Stolze Web page annotation systems
US20030041305A1 (en) * 2001-07-18 2003-02-27 Christoph Schnelle Resilient data links
US20030084095A1 (en) * 2001-10-26 2003-05-01 Hayden Douglas Todd Method to preserve web page links using registration and notification
US20030084143A1 (en) * 2001-10-31 2003-05-01 Herbert Knoesel Resource locator management system and method
GB2383157A (en) * 2001-10-31 2003-06-18 Hewlett Packard Co Resource locator management system
US8429201B2 (en) * 2001-11-13 2013-04-23 International Business Machines Corporation Updating a database from a browser
US20030093400A1 (en) * 2001-11-13 2003-05-15 International Business Machines Corporation Method for updating a database from a browser
US7660876B2 (en) 2001-12-13 2010-02-09 Siemens Product Lifecycle Management Software Inc. Electronic file management
US7536404B2 (en) * 2001-12-13 2009-05-19 Siemens Product Lifecycle Management Software, Inc. Electronic files preparation for storage in a server
US20030115172A1 (en) * 2001-12-13 2003-06-19 Mangalvedhekar Sunit B. Electronic file management
US20030115171A1 (en) * 2001-12-13 2003-06-19 Mangalvedhekar Sunit B. Electronic files preparation for storage in a server
US20030131005A1 (en) * 2002-01-10 2003-07-10 International Business Machines Corporation Method and apparatus for automatic pruning of search engine indices
US20030158953A1 (en) * 2002-02-21 2003-08-21 Lal Amrish K. Protocol to fix broken links on the world wide web
US7689667B2 (en) * 2002-02-21 2010-03-30 International Business Machines Corporation Protocol to fix broken links on the world wide web
US7539740B2 (en) * 2002-03-25 2009-05-26 Fujitsu Limited Web server managing method, program and recording medium to monitor occurrence of link breakage
US20030182417A1 (en) * 2002-03-25 2003-09-25 Fujitsu Limited Web server managing method, program and recording medium
US7100109B1 (en) * 2002-06-17 2006-08-29 Microsoft Corporation Identifying URL references in script included in markup language documents
US7496636B2 (en) 2002-06-19 2009-02-24 International Business Machines Corporation Method and system for resolving Universal Resource Locators (URLs) from script code
US20040143787A1 (en) * 2002-06-19 2004-07-22 Constantine Grancharov Method and system for resolving universal resource locators (URLs) from script code
US9886309B2 (en) 2002-06-28 2018-02-06 Microsoft Technology Licensing, Llc Identity-based distributed computing for device resources
US7246122B2 (en) * 2002-06-28 2007-07-17 Microsoft Corporation Schema-based services for identity-based data access to favorite website data
US20040002976A1 (en) * 2002-06-28 2004-01-01 Lucovsky Mark H. Schema-based services for identity-based data access to favorite website data
US20040083424A1 (en) * 2002-10-17 2004-04-29 Nec Corporation Apparatus, method, and computer program product for checking hypertext
US7464326B2 (en) * 2002-10-17 2008-12-09 Nec Corporation Apparatus, method, and computer program product for checking hypertext
US7624173B2 (en) * 2003-02-10 2009-11-24 International Business Machines Corporation Method and system for classifying content and prioritizing web site content issues
US20040158429A1 (en) * 2003-02-10 2004-08-12 Bary Emad Abdel Method and system for classifying content and prioritizing web site content issues
US20080016025A1 (en) * 2003-06-28 2008-01-17 Beynon Margaret A R Guaranteeing hypertext link integrity
US8135705B2 (en) 2003-06-28 2012-03-13 International Business Machines Corporation Guaranteeing hypertext link integrity
US20040267726A1 (en) * 2003-06-28 2004-12-30 International Business Machines Corporation Hypertext request integrity and user experience
US20050120292A1 (en) * 2003-11-28 2005-06-02 Fuji Xerox Co., Ltd. Device, method, and computer program product for generating information of link structure of documents
US7401287B2 (en) * 2003-11-28 2008-07-15 Fuji Xerox Co., Ltd. Device, method, and computer program product for generating information of link structure of documents
US7290205B2 (en) * 2004-06-23 2007-10-30 Sas Institute Inc. System and method for management of document cross-reference links
US20050289446A1 (en) * 2004-06-23 2005-12-29 Moncsko Cynthia A System and method for management of document cross-reference links
US9021529B2 (en) 2004-07-15 2015-04-28 Microsoft Technology Licensing, Llc Content recordation techniques
US20060036636A1 (en) * 2004-08-13 2006-02-16 Small Jason K Distributed object-based storage system that uses pointers stored as object attributes for object analysis and monitoring
US9430445B2 (en) * 2004-11-29 2016-08-30 International Business Machines Corporation Document editor and method for editing document
US20060117249A1 (en) * 2004-11-29 2006-06-01 Hu Xiao W Document editor and method for editing document
US20060161561A1 (en) * 2005-01-20 2006-07-20 Stanley Tsai Broken Hyperlink auto-redirection and management system and method
US9633356B2 (en) 2006-07-20 2017-04-25 Aol Inc. Targeted advertising for playlists based upon search queries
US8255873B2 (en) 2006-11-20 2012-08-28 Microsoft Corporation Handling external content in web applications
US20080120533A1 (en) * 2006-11-20 2008-05-22 Microsoft Corporation Handling external content in web applications
US8341177B1 (en) * 2006-12-28 2012-12-25 Symantec Operating Corporation Automated dereferencing of electronic communications for archival
US20080235565A1 (en) * 2007-03-21 2008-09-25 International Business Machines Corporation System and Method for Reference Validation in Word Processor Documents
US9665543B2 (en) 2007-03-21 2017-05-30 International Business Machines Corporation System and method for reference validation in word processor documents
US20090172154A1 (en) * 2007-12-31 2009-07-02 International Business Machines Corporation Method for autonomic detection and repair of broken links in web environments
US8326941B2 (en) * 2007-12-31 2012-12-04 International Business Machines Corporation Method for autonomic detection and repair of broken links in web environments
US20110238745A1 (en) * 2008-12-25 2011-09-29 Kyocera Corporation Communication device, web server apparatus and communication system
US9330194B2 (en) * 2008-12-25 2016-05-03 Kyocera Corporation Communication device, web server apparatus and communication system
US9110900B2 (en) 2009-07-30 2015-08-18 International Business Machines Corporation Generating simulated containment reports of dynamically assembled components in a content management system
US20110029861A1 (en) * 2009-07-30 2011-02-03 International Business Machines Corporation Generating Simulated Containment Reports of Dynamically Assembled Components in a Content Management System
US8572473B2 (en) * 2009-07-30 2013-10-29 International Business Machines Corporation Generating simulated containment reports of dynamically assembled components in a content management system
US9170998B2 (en) 2009-07-30 2015-10-27 International Business Machines Corporation Generating simulated containment reports of dynamically assembled components in a content management system
US9135251B2 (en) 2009-07-30 2015-09-15 International Business Machines Corporation Generating simulated containment reports of dynamically assembled components in a content management system
US20110153631A1 (en) * 2009-12-23 2011-06-23 Kondasani Thakur B Methods and systems for detecting broken links within a file
US8666996B2 (en) 2009-12-23 2014-03-04 Mastercard International Incorporated Methods and systems for detecting broken links within a file
US20120179940A1 (en) * 2010-04-21 2012-07-12 International Business Machines Corporation Notice of restored malfunctioning links
US8825837B2 (en) * 2010-04-21 2014-09-02 International Business Machines Corporation Notice of restored malfunctioning links
US20110264757A1 (en) * 2010-04-21 2011-10-27 International Business Machines Corporation Notice of restored malfunctioning links
US8639806B2 (en) * 2010-04-21 2014-01-28 International Business Machines Corporation Notice of restored malfunctioning links
US8639804B2 (en) * 2010-09-02 2014-01-28 Oracle International Corporation Techniques for maintaining current content
US20120059929A1 (en) * 2010-09-02 2012-03-08 Oracle International Corporation Techniques for maintaining current content
US20120151323A1 (en) * 2010-12-10 2012-06-14 International Business Machines Corporation System, method, and computer program product for management of web page links
US9460223B2 (en) 2010-12-10 2016-10-04 International Business Machines Corporation System, method, and computer program product for management of web page links
US8996977B2 (en) * 2010-12-10 2015-03-31 International Business Machines Corporation System, method, and computer program product for management of web page links
US8671108B2 (en) 2011-09-02 2014-03-11 Mastercard International Incorporated Methods and systems for detecting website orphan content
US20140108901A1 (en) * 2012-10-17 2014-04-17 International Business Machines Corporation Web Browser Bookmark Reconciliation
US9536445B2 (en) * 2012-10-31 2017-01-03 disruptDev, LLC System and method for visually tracking a learned process
US20140122384A1 (en) * 2012-10-31 2014-05-01 Disruptdev, Llc D/B/A Trails.By System and method for visually tracking a learned process
US20140181633A1 (en) * 2012-12-20 2014-06-26 Stanley Mo Method and apparatus for metadata directed dynamic and personal data curation
US20150358397A1 (en) * 2013-01-28 2015-12-10 British Telecommunications Public Limited Company Distributed system
US11115462B2 (en) * 2013-01-28 2021-09-07 British Telecommunications Public Limited Company Distributed system
US20160373332A1 (en) * 2015-06-18 2016-12-22 International Business Machines Corporation Web site reachability management for content browsing
US10389614B2 (en) * 2015-06-18 2019-08-20 International Business Machines Corporation Web site reachability management for content browsing
US11012339B2 (en) * 2015-06-18 2021-05-18 International Business Machines Corporation Web site reachability management for content browsing
CN106557334A (en) * 2015-09-25 2017-04-05 北京国双科技有限公司 Determination methods and device that reptile task is completed
CN106557334B (en) * 2015-09-25 2020-02-07 北京国双科技有限公司 Method and device for judging completion of crawler task
US20210204132A1 (en) * 2016-09-02 2021-07-01 Blink.Cloud LLC Media agnostic content access management
US11785464B2 (en) * 2016-09-02 2023-10-10 The Private Sector Group, Llc. Media agnostic content access management
US11361046B2 (en) * 2016-10-17 2022-06-14 Google Llc Machine learning classification of an application link as broken or working

Similar Documents

Publication Publication Date Title
US6253204B1 (en) Restoring broken links utilizing a spider process
CN101243430B (en) Method for copying and updating files
US5802299A (en) Interactive system for authoring hypertext document collections
US7043505B1 (en) Method variation for collecting stability data from proprietary systems
US5781909A (en) Supervised satellite kiosk management system with combined local and remote data storage
JP3651873B2 (en) Computer system configuration change tracking method
US5761683A (en) Techniques for changing the behavior of a link in a hypertext document
CA2345540C (en) Computer-readable recorded medium on which image file is recorded, device for producing the recorded medium, medium on which image file creating program is recorded, device for transmitting image file, device for processing image file, and medium on which image file processing program is recorded
KR101556905B1 (en) Managing web page links using structured data
CN101611422A (en) Web data usage platform
WO1997015890A1 (en) Identifying changes in on-line data repositories
US7343529B1 (en) Automatic error and corrective action reporting system for a network storage appliance
US20060015573A1 (en) System and method for automatic redirection to stored web resources upon access failure
JP5235402B2 (en) Task execution device, task execution method, and computer program
US7363368B2 (en) System and method for transaction recording and playback
JP2006048679A (en) Agent administration console software for servicing failed request
CN1980153A (en) System and method to manage changes to computer system
JP4541764B2 (en) A micro-monitor for monitoring database environments
US20090300505A1 (en) Information processing apparatus, recovering method of entry information thereto, and recording medium
US20050234990A1 (en) System and method for tracking documents
WO2000074193A9 (en) User support system and method
JP2004145715A (en) Maintenance system and maintenance method for computer
JP2006099249A (en) Fault management device and fault management method
JP4804139B2 (en) Information output method, system and program
JP4642553B2 (en) Software module failure impact analysis device, failure impact analysis method, and failure impact solution program

Legal Events

Date Code Title Description
AS Assignment

Owner name: SUN MICROSYSTEMS, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GLASS, BOB;NIELSEN, JAKOB;FOGG, BJ;REEL/FRAME:009271/0357;SIGNING DATES FROM 19980526 TO 19980601

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: ORACLE AMERICA, INC., CALIFORNIA

Free format text: MERGER AND CHANGE OF NAME;ASSIGNORS:ORACLE USA, INC.;SUN MICROSYSTEMS, INC.;ORACLE AMERICA, INC.;REEL/FRAME:037278/0579

Effective date: 20100212